The Company's business is dependent upon the secure processing, storage, and transmission of information over computer networks using applications, systems and other technologies. The business depends on effective information security and systems to perform accounting, policy administration, claims, underwriting, actuarial and all aspects of day-to-day operations necessary to service the Company's customers and agents, to value the Company's investments and to timely and accurately report the Company's financial results.
The information systems the Company relies upon must ensure confidentiality, integrity, and availability of the data, including systems maintained by the Company as well as data in and assets held through third-party service providers and systems. The Company employs various measures, systems, applications and software to address data security. The Company reviews its existing security measures and systems on a continuing basis through internal and independent evaluations. The Company has implemented administrative and technical controls and takes protective actions in an attempt to reduce the risk of cyber incidents.
The Company's internal and external controls, processes, and the vendors used to protect networks, systems and applications, individually or together, may be insufficient to prevent a security incident. Employee or third-party vendor errors, malicious acts, unauthorized access, computer viruses, malware, the introduction of malicious code, system failures and disruptions, and cyber-attacks can result in, among other things, business interruption, compromise of data and loss of assets. Complexity of the Company's technology increases regularly and has increased the risk of a security incident involving data, network, systems and applications.
Third parties, including third party administrators, third party vendors, and cloud-based systems, are also subject to cyber-attacks and breaches of confidential information, along with the other risks outlined above. Such incidents, whether at the Company or its third-party vendors, may result in the Company incurring substantial costs and other negative consequences, including a material adverse effect on the Company's business, reputation, financial condition, results of operations or liquidity. The Company's use of cloud technology, software as a service, and open source software can make it more difficult to identify and remedy such situations due to the disparate location of code utilized in its operations.
Security incidents have the potential to interrupt business, cause delays in processes and procedures directly affecting the Company, and jeopardize the Company's, insureds', claimants', agents' and others' confidential data resulting in data loss, loss of assets, and reputational damages. If this occurs, it could have a material adverse effect on the Company's business operations and financial results.
Security incidents could require significant resources, both internal and external, to resolve or remediate and could result in financial losses that may not be covered by insurance or not fully recoverable under any insurance. The Company may be subject to litigation and damages or regulatory action under data protection and privacy laws and regulations enacted by federal, state and foreign governments, or other regulatory bodies. As a result, the Company's ability to conduct its business and its results of operations might be materially and adversely affected.